0% found this document useful (0 votes)
24 views

DS Lecture 4 & 5

Uploaded by

basesaliberatus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

DS Lecture 4 & 5

Uploaded by

basesaliberatus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 111

THE UNITED REPUBLIC OF TANZANIA

MINISTRY OF TRANSPORT
NATIONAL INSTITUTE OF TRANSPORT

ITU 08106: Distributed Systems


Nassoro M. Lwamo

Department of Computing & Communication Technology


Lecture Outline
v Networking Issues in Distributed Systems
Ø Latency
Ø Transfer Rate
v Types of Networks
v Network Principles
v Cluster Computing
Ø Advantages
Ø Disadvantages
vTypes of Computing Clusters
vConfiguring Cluster

Department of Computing and Communication


Technology (CCT) slide 2
Networking Issues in Distributed System
v Regarding the development of distributed applications that
require the sharing of resources in the networked
environment, a higher standard of performance for the
network to meet the demand of distributed applications is
needed
v Also, with the growth of the Internet and the emergency of
new modes of using the Internet, more strict requirements
for reliability, scalability, mobility, security, and quality of
service have emerged

Department of Computing and Communication


Technology (CCT) slide 3
Networking Issues in Distributed System
v Performance: The network performance parameters are
those affecting the speed during the process of transferring
messages between two interconnected computers
v These parameters include latency and point-to-point data
transfer rate
v Latency: is the delay that occurs after a send operation is
executed and before data starts to arrive at the destination
computer
v Latency refers to the time it takes for a data packet/message to
travel from its source to its destination across a network
v Considering only network latency, which forms a part of the
process-to-process latency

Department of Computing and Communication


Technology (CCT) slide 4
Networking Issues in Distributed System
v Data transfer rate: the speed at which data can be transferred
between two computers in the network once transmission has
begun, usually quoted in bits per second
v Following these definitions (Latency and data transfer rate),
the time required for a network to transfer a message
containing length bits between two computers is

[Message transmission time = latency + length/data transfer rate]

Department of Computing and Communication


Technology (CCT) slide 5
Networking Issues in Distributed System
v The equation is valid for messages whose length does not
exceed a maximum determined by the underlying network
technology
v Longer messages have to be segmented; the transmission
time is then calculated as the sum of the times for the
segments
v The transfer rate of a network is determined by its
physical characteristics
v The latency is determined by software overheads, routing
delays, and a load-dependent element arising from
conflicting demands for access to transmission channels

Department of Computing and Communication


Technology (CCT) slide 6
Networking Issues in Distributed System
v A large number of messages transferred between
processes in distributed systems are small in size;
v Latency is therefore of equal or greater implication than
transfer rate in determining performance
v The total system bandwidth of a network is a measure of
throughput – the total volume of traffic that can be
transferred across the network in a given time
v In local area network (LAN) technologies, such as Ethernet,
the full transmission capacity of the network is used for
every transmission and the system bandwidth is the same
as the data transfer rate
Department of Computing and Communication
Technology (CCT) slide 7
Networking Issues in Distributed System
v In wide-area networks (WAN), messages can be
transferred using different channels simultaneously, the
total system bandwidth bears no direct relationship to
the transfer rate
v The performance of networks weakens in conditions of
overload – when there are too many messages in the
network at the same time

Department of Computing and Communication


Technology (CCT) slide 8
Types of Networks
v In supporting distributed systems, various types of
networks can be used for communication and
coordination between the nodes or components
v The choice of network type depends on factors such
as the scale of the distributed system, the
communication requirements, and the underlying
infrastructure
v Internetwork is a network that is composed of many
interconnected networks, integrated to provide a
single data communication medium

Department of Computing and Communication


Technology (CCT) slide 9
Types of Networks
v Types of networks that support distributed systems
v Personal Area Networks (PANs)
v Local Area Networks (LANs)
v Wide Area Networks (WANs)
v Metropolitan Area Networks (MANs)
v Wireless Area Networks (WANs)
v Wireless metropolitan area networks (WMANs)
v Wireless wide area networks (WWANs)
v Internetworks

Department of Computing and Communication


Technology (CCT) slide 10
Types of Networks
v Types of networks that support distributed systems
v Personal Area Networks (PANs):
v A Personal Area Network (PAN) is a type of network that
connects devices within the immediate surrounding area of an
individual, typically within a range of a few meters
v PANs are designed for personal use and enable
communication and data sharing between devices used by an
individual
v One of the most common real-world examples of a PAN is the
connection between a Bluetooth earpiece and a smartphone
v PAN network connections can either be wired or wireless
v Wired connection methods include USB; wireless connection
methods include Bluetooth (the most common)
Department of Computing and Communication
Technology (CCT) slide 11
Types of Networks
v Types of networks that
support distributed
systems
v Personal Area
Networks (PANs):
v Wireless PAN doesn’t
require cables but it
requires that all
devices that need to
be connected to a
network to be
Bluetooth- or infrared-
capable Source https://www.techslang.com/definition/what-is-a-personal-area-network/

Department of Computing and Communication


Technology (CCT) slide 12
Types of Networks
v Types of networks that support distributed systems
v Local Area Networks (LANs):
v A Local Area Network (LAN) is a computer network that
connects devices within a limited geographical area, such as a
home, office building, or campus
v LANs facilitate communication and resource sharing between
connected devices, such as computers, printers, servers, and
other network-enabled devices
v Local Area Networks – Characteristics & Components
v Size and Coverage: LANs cover a small area, such as a single
building, floor, or a group of nearby buildings
v They are differentiated by their limited geographic scope

Department of Computing and Communication


Technology (CCT) slide 13
Types of Networks
v Types of networks that support distributed systems
v Local Area Networks – Characteristics & Components
v Topology: LAN topology is the physical or logical arrangement
of devices and connections within a Local Area Network (LAN)
v LANs are set up using different network topologies, including
bus, ring, star, mesh, or a combination of these
v The choice of topology depends on factors such as cost,
scalability, and network requirements
v Transmission Media: LANs use different types of transmission
media to connect devices
v These include Ethernet cables (such as twisted pair or fiber
optic cables) or wireless technologies (such as Wi-Fi)

Department of Computing and Communication


Technology (CCT) slide 14
Types of Networks
v Types of networks that support distributed systems
v Local Area Networks – Characteristics & Components
v Network Devices: LANs consist of various network devices that
enable communication and resource-sharing
v These devices include switches, routers, hubs, wireless access
points, and network interface cards (NICs) on individual devices
v Larger local networks, such as campuses or office buildings, are
composed of many segments interconnected by switches
v Addressing: LANs use addressing schemes, such as IP (Internet
Protocol) addresses, to uniquely identify devices on the network
v IP addresses are assigned to each device, allowing them to send
and receive data over the network

Department of Computing and Communication


Technology (CCT) slide 15
Types of Networks
v Types of networks that support distributed systems
v Local Area Networks – Characteristics & Components
v Protocols: To ensure how data are transmitted, received, and
managed within the network, LAN has to comply with Network
Protocols
v Common LAN protocols include Ethernet, Wi-Fi (802.11), and
TCP/IP (Transmission Control Protocol/Internet Protocol)
v Security: LANs incorporate security measures to protect
sensitive information and prevent unauthorized access
v This includes the use of firewalls, access control mechanisms,
encryption, and network monitoring tools

Department of Computing and Communication


Technology (CCT) slide 16
Types of Networks
v Types of networks that support distributed systems
v Wide Area Networks (WANs):
v In its simplest form, a wide-area network (WAN) is a collection
of local-area networks (LANs) or other networks that
communicate with one another
v WANs carry messages at lower speeds between nodes that
might be in different organizations and may be separated by
large distances
v They may be located in different cities, countries, or continents
v Routers are the key communication medium that set a
communication circuits linking a set of dedicated computers
v Routers manage the communication network and route
messages or packets to their destinations

Department of Computing and Communication


Technology (CCT) slide 17
Types of Networks
v Types of networks that support distributed systems
v Wide Area Networks (WANs):
v In most networks, the routing operations introduce a delay at
each point in the route, so the total latency for the
transmission of a message depends on the route that it follows
and the traffic loads in the various network segments that it
traverses
v The purpose of a WAN is to enable the exchange of data and
facilitate communication between connected locations
v Allowing organizations to centralize their resources, share
information, and collaborate across multiple sites
v WANs support various types of data transmission, including
voice, video, and other forms of multimedia
Department of Computing and Communication
Technology (CCT) slide 18
Types of Networks
v Types of networks that support distributed systems
v Metropolitan Area Networks (WANs):
v Like WANs, a MAN is made up of interconnected LANs
v A MAN is larger than a local area network (LAN) but smaller
than a wide area network (WAN)
v Because MANs are smaller, they are usually more efficient
than WANs, since data does not have to travel over large
distances
v MANs typically combine the networks of multiple organizations,
instead of being managed by a single organization

Department of Computing and Communication


Technology (CCT) slide 19
Types of Networks
v Types of networks that support distributed systems
v Wireless Local Area Networks (WLANs):
v A Wireless Local Area Network (WLAN) is a type of local area
network (LAN) that uses wireless communication technologies
to connect devices within a limited area
v They are designed for use in place of wired LANs to provide
connectivity for mobile devices, or simply to remove the need
for a wired infrastructure to connect computers within homes
and office buildings to each other and the Internet
v They are in widespread use in several variants of the IEEE
802.11 standard (WiFi), offering bandwidths of 10–100 Mbps
over ranges up to 1.5 kilometers
v WLANs use radio waves to transmit data between devices

Department of Computing and Communication


Technology (CCT) slide 20
Types of Networks
v Types of networks that support distributed systems
v WLANs Characteristics & Components:
v Wireless Access Points (APs): APs are devices that serve as
the central point of connectivity in a WLAN
v They transmit and receive wireless signals, allowing devices to
connect to the network
v APs are typically connected to a wired network infrastructure
and act as a bridge between wired and wireless devices
v Wireless Clients: Wireless clients are devices that connect to
the WLAN, such as laptops, smartphones, tablets, and IoT
devices
v These devices have built-in wireless network adapters that
enable them to communicate with the WLAN infrastructure

Department of Computing and Communication


Technology (CCT) slide 21
Types of Networks
v Types of networks that support distributed systems
v WLANs Characteristics & Components:
v Roaming: WLANs support roaming, which allows wireless
devices to maintain connectivity while moving within the
coverage area
v When a device moves out of range of one access point, it
automatically connects to another nearby access point without
disrupting the network connection
v Wireless LAN Controllers: In larger WLAN deployments, wireless
LAN controllers may be used to manage and control multiple
access points
v These controllers centralize the management of the WLAN,
allowing administrators to configure settings, monitor
performance, and enforce security policies across the network
Department of Computing and Communication
Technology (CCT) slide 22
Types of Networks
v Types of networks that support distributed systems
v Wireless Metropolitan Area Networks (WMANs)
v A Wireless Metropolitan Area Network (WMAN) is a type of
Metropolitan Area Network (MAN) that provides connectivity
through wireless
v It spans multiple locations within a geographic area
v It is one type of wireless networking that has a coverage area
approximately the size of a city
v Generally, it spans or covers an area that is larger than the
WLAN but smaller than the Wireless Wide Area Network (WWAN)

Department of Computing and Communication


Technology (CCT) slide 23
Types of Networks
v Types of networks that support distributed systems
v Wireless Wide Area Networks (WWANs)
v Wireless Wide Area Networks (WWANs) are wireless networks
that provide connectivity over a wide geographic area larger than
a metropolitan area
v WWANs use wireless communication technologies to enable
data transmission and connectivity across long distances,
allowing users to access network resources and services without
the need for physical cables
v Most mobile phone networks utilize WWAN since they are
designed to operate over wide areas (entire countries or
continents) through the use of cellular radio connections; their
data transmission facilities therefore offer wide-area mobile
connections to the Internet for portable devices
Department of Computing and Communication
Technology (CCT) slide 24
Types of Networks
v Types of networks that support distributed systems
v WWANs Characteristics & Components
v Coverage: WWANs cover large areas, such as regional, national,
or global territories
v They are designed to provide wireless connectivity over long
distances, connecting users in different cities, regions, or even
countries
v Wireless Technologies: WWANs make use of various wireless
technologies for data transmission
v These technologies include cellular networks (e.g., Global
System for Mobile Communication (GSM) standard, third
generation (3G) mobile phone networks, 4G, 5G), satellite
communications, and other wireless technologies that provide
wide-area coverage
Department of Computing and Communication
Technology (CCT) slide 25
Types of Networks
v Types of networks that support distributed systems
v WWANs Characteristics & Components
v Network Infrastructure: WWANs rely on a network
infrastructure composed of cellular towers, satellite systems,
base stations, and other transmission equipment
v These infrastructure components enable wireless connectivity
and facilitate the transmission of data over long distances
v Mobile Devices: Mobile devices, such as smartphones, tablets,
and laptops, act as wireless clients in WWANs
v These devices have built-in wireless capabilities and can
connect to WWANs through cellular networks
v They utilize Subscriber Identity Module (SIM) cards or other
authentication mechanisms to access WWAN services
Department of Computing and Communication
Technology (CCT) slide 26
Types of Networks
v Types of networks that support distributed systems
v WWANs Characteristics & Components
v Service Providers: WWANs are operated by telecommunication
service providers, mobile network operators, or satellite
communication companies
v These providers offer wireless connectivity services to
customers, providing network coverage and enabling data
transmission over their network infrastructure
v Roaming: WWANs support roaming capabilities, allowing users
to maintain connectivity while moving between different
geographic areas
v Roaming enables seamless access to network services and
resources as users travel across different regions covered by
WWAN infrastructure
Department of Computing and Communication
Technology (CCT) slide 27
Types of Networks
v Types of networks that support distributed systems
v Internetworks
v An internetwork, also known as an internet, is a collection of
interconnected networks that are linked together using routers
and other networking devices
v It refers to a network of networks, where individual networks
are connected to form a larger network infrastructure to
provide common data communication facilities
v The openness characteristic of distributed systems implies
that the networks used in distributed systems should be
extensible to very large numbers of computers, whereas
individual networks have restricted address spaces and some
have performance limitations

Department of Computing and Communication


Technology (CCT) slide 28
Types of Networks
v Types of networks that support distributed systems
v Internetworks
v In Internetworks, a variety of local and wide area network
technologies are integrated to provide the networking capacity
needed by each group of users
v Internetworks brings many of the benefits of open systems to
the provision of communication in distributed systems
v Internetworks are constructed from a variety of component
networks
v They are interconnected by routers and an integrated
communication subsystem is produced by a software layer that
supports the addressing and transmission of data to
computers throughout the internetwork

Department of Computing and Communication


Technology (CCT) slide 29
Network Principles
v The basis for all computer networks is the packet-switching
technique first developed in the 1960s
v This enables data packets addressed to different
destinations to share a single communications link, unlike
the circuit-switching technology that underlies conventional
telephony
v Packets are queued in a buffer and transmitted when the
link is available
v Communication is asynchronous – messages arrive at
their destination after a delay that varies depending on the
time that packets take to travel through the network
Department of Computing and Communication
Technology (CCT) slide 30
Network Principles
v Key Networking Principles that govern the Distributed
Systems

v Packets Transmissions
v Data Streaming
v Switching Scheme
v Protocols
v Routing
v Congestion Control
v Internetworking

Department of Computing and Communication


Technology (CCT) slide 31
Network Principles
Packets Transmissions:
v Packet transmission refers to the process of sending data over
a network in the form of small units called packets
v In packet-switched networks, such as the Internet, large
amounts of data are divided into smaller packets before being
transmitted from the source to the destination
v At the Destination, these packets are then recombined by the
computer or device that receives them
v Example: Suppose a user loads an image from a Web
v The image file does not go from a web server to the user's
computer in one piece
v Instead, it is broken down into packets of data, sent over the
wires, cables, and radio waves of the Internet, and then
reassembled by the user's computer into the original Image
Department of Computing and Communication
Technology (CCT) slide 32
Network Principles
Packets Transmissions:
v Why Use Packets?
v The Internet is a "packet-switching" network
v Packet switching refers to the ability of networking equipment to
process packets independently from each other
v It also means that packets can take different network paths to
the same destination, so long as they all arrive at the destination
v Because of packet switching, packets from multiple computers
can travel over the same wires in any order
v This enables multiple connections to take place over the same
networking equipment at the same time
v Allows billions of devices to exchange data on the Internet at the
same time
Department of Computing and Communication
Technology (CCT) slide 33
Network Principles
Packets Transmissions: How does it work?
v Data Segmentation: The data to be transmitted is divided into
smaller, fixed-sized units called packets
v Each packet consists of a header and a payload
v The header contains information such as the source and
destination addresses, packet sequence number, error detection
codes, and other control information
v Routing: Once the packets are created, they are sent to the
network layer, which is responsible for determining the best path
for each packet to reach its destination (Routing Process)
v Routers along the path examine the destination address in the
packet header and use routing protocols to make decisions on
how to forward the packet to the destination

Department of Computing and Communication


Technology (CCT) slide 34
Network Principles
Packets Transmissions: How does it work?
v Transmission: The packets are then transmitted over the
network using various transmission media, such as copper
wires, fiber optics, or wireless connections
v The specific method of transmission depends on the
underlying network technology
v Packet Switching: As the packets travel through the network,
they may pass through multiple routers
v At each router, the packet is received, and the router examines
the destination address in the packet header to determine the
next hop along the path
v The router then forwards the packet to the appropriate
outgoing interface

Department of Computing and Communication


Technology (CCT) slide 35
Network Principles
Packets Transmissions: How does it work?
v Reassembly: Once all the packets reach the destination, they
are reassembled into the original data stream based on the
sequence numbers in their headers
v The reassembled data can then be processed and delivered to
the receiving application
v Acknowledgment and Retransmission: To ensure reliable
packet transmission, the receiving end acknowledges the
receipt of each packet by sending an acknowledgment (ACK)
back to the sender
v If the sender does not receive an acknowledgment within a
specified timeout period or if it receives a negative
acknowledgment (NACK), it may retransmit the packet

Department of Computing and Communication


Technology (CCT) slide 36
Network Principles

v The process of dividing data into packets,


transmitting them independently, and
reassembling them at the destination allows for
efficient and reliable communication over
networks

v The process also enables the network to handle


congestion and varying network conditions by
dynamically routing packets and accommodating
different types of traffic

Department of Computing and Communication


Technology (CCT) slide 37
Network Principles
Data Streaming:
v Streaming is the process of transmitting, processing, and
analyse data (data stream) across multiple network nodes in
real-time
v Multimedia applications rely upon the transmission of
continuous streams of audio and video data elements at
guaranteed high rates and with small latencies
v The timely delivery of audio and video streams depends upon
the availability of connections with adequate quality of service
– bandwidth, latency and reliability must all be considered
v UDP internet packets are generally used to hold the video
frames
v The play time of a multimedia element such as a video frame
is the time at which it must be displayed
Department of Computing and Communication
Technology (CCT) slide 38
Network Principles
Data Streaming:
v Elements that arrive at their destination later than their play
time are no longer useful and will be dropped by the receiving
process
v Streaming data is generated by various sources such as
sensors, applications, or systems
v These sources produce a continuous flow of data in an
ordered way that needs to be collected, processed, and
analysed in real-time
v The data can be in the form of text, audio, video, or any other
type of digital information

Department of Computing and Communication


Technology (CCT) slide 39
Network Principles
Data Streaming:

Source: https://jenkov.com/tutorials/data-streaming/index.html

Characteristics of Data Streaming


v Real-time or near real-time: Data streaming enables the
processing of data as it is generated, allowing for real-time or
near real-time analysis and decision-making
v Continuous flow: Data is transmitted as a continuous flow of
small packets or chunks
v The data is not stored in its entirety before being processed,
but rather processed incrementally as it arrives
Department of Computing and Communication
Technology (CCT) slide 40
Network Principles
Data Streaming:
Characteristics of Data Streaming
v Unbounded data: Streaming data is unbounded, meaning that
there is no predefined end to the data stream. It can continue
indefinitely or until a specific condition is met
v Scalability: Data streaming systems are designed to handle
large volumes of data and scale horizontally as the data rates
increase. They can accommodate high-velocity data streams
and distributed processing
v Data streaming is commonly used for various purposes, such
as real-time monitoring and alerting, fraud detection,
recommendation systems

Department of Computing and Communication


Technology (CCT) slide 41
Network Principles
Switching Scheme:
v A switching scheme refers to the method or technique
used to forward data packets between network nodes in
a network
v OR It is the process of exchanging information between
two communication devices
v The switching technique is responsible for deciding the
best route for data transmission
v The technique is used to connect the systems for making
one-to-one communication

Department of Computing and Communication


Technology (CCT) slide 42
Network Principles
Switching Scheme:
Types of switching in computer networks

v Circuit Switching: is a switching technique that


establishes a dedicated communication path between
two network devices for the duration of a data
transmission
v The path remains open throughout the entire
communication session, regardless of whether data is
being transmitted or not
v A complete end-to-end path must exist before the
communication takes place
Department of Computing and Communication
Technology (CCT) slide 43
Network Principles
Switching Scheme:
Types of switching in computer networks

v Circuit Switching: When the data needs to be sent


(voice, video), the request signal is sent first to the
receiver
v The receiver sends back the acknowledgment to ensure
the availability of the dedicated path
v After receiving the acknowledgment, dedicated path is
established and the transfers of the data begin
v Communication has three phases: Circuit
Establishment, Data Transfer, Circuit Disconnect
Department of Computing and Communication
Technology (CCT) slide 44
Network Principles
Switching Scheme:
Types of switching in computer networks
v Circuit Switching:
v Circuit Establishment - A dedicated circuit between the source
and the destination is established with the help of the
intermediate switching centres
v The requesting and receiving of the communication signals
are possible when the sender and receiver transmit signals
across the circuit
v Data Transfer - The transfer of data and voice signals are possible
between the source and the destination after the establishment of
the circuit
v The connection between both the end parties continues as
long as they communicate
Department of Computing and Communication
Technology (CCT) slide 45
Network Principles
Switching Scheme:
Types of switching in computer networks
v Circuit Switching:
v Circuit Disconnect - The disconnection in the circuit
happens when one of the users initiates to disconnect
v When the disconnection takes place, all the intermediate
links between the sender and receiver are removed

Department of Computing and Communication


Technology (CCT) slide 46
Network Principles
Switching Scheme:
Types of switching
Circuit Switching:

Source https://byjus.com/physics/circuit-switching/

Department of Computing and Communication


Technology (CCT) slide 47
Network Principles
Switching Scheme:
Types of switching
Packet Switching:
v Packet switching is a connectionless network switching
method
v It is a switching technique in which the message is
divided into smaller pieces, and they are sent
individually
v The message splits into smaller pieces known as
packets and packets are given a unique number to
identify their order at the receiving end

Department of Computing and Communication


Technology (CCT) slide 48
Network Principles
Switching Scheme:
Types of switching
Packet Switching:
v Every packet contains some information in its headers such
as source address, destination address and sequence
number
v The packet travels across the network, taking the shortest
path as possible
v All the packets are reassembled at the receiving end in
correct order, a resend process is performed when a packet
failed to reach its destination
v The acknowledgment message will be sent when packet is
received Department of Computing and Communication
Technology (CCT) slide 49
Network Principles
Switching Scheme:
Types of switching
Packet Switching:

Source https://www.javatpoint.com/computer-network-switching-techniques

Department of Computing and Communication


Technology (CCT) slide 50
Network Principles
Protocols:
v The term protocol is used to refer to a set of rules and
formats used for communication between processes in
order to perform a given task
v The definition of a protocol has two parts:
v Specification of the sequence of messages to be exchanged
v Specification of the format of the data in the messages
v The existence protocols enables the separate software
components of distributed systems to be developed
independently and implemented in different
programming languages on computers that may have
different order codes and data representations
Department of Computing and Communication
Technology (CCT) slide 51
Network Principles
Protocols:
v A protocol is implemented by a pair of software modules
located in the sending and receiving computers
v Protocol layers:
v Network software is arranged in a hierarchy of layers
v Each layer presents an interface to the layers above it
that extends the properties of the underlying
communication system
v Each layer of network software communicates by local
procedure calls with the layers above and below it

Department of Computing and Communication


Technology (CCT) slide 52
Network Principles
Protocols:
v Protocol layers:

The structure and the flow of data when a message is transmitted using a layered
protocol
Department of Computing and Communication
Technology (CCT) slide 53
Network Principles
Protocols:
v Protocol layers:
v On the sending side, each layer (except the topmost, or
application layer) accepts items of data in a specified format
from the layer above it and applies transformations to
encapsulate the data in the format specified for that layer
before passing it to the layer below for further processing
v On the receiving side, the inverse transformations are applied
to data items received from the layer below before they are
passed to the layer above
v The protocol type of the layer above is included in the header
of each layer, to enable the protocol stack at the receiver to
select the correct software components to unpack the
packets
Department of Computing and Communication
Technology (CCT) slide 54
Network Principles
Protocols:
v Protocol layers:

Encapsulation in the layered protocols

Department of Computing and Communication


Technology (CCT) slide 55
Network Principles
Protocols:
v Protocol Suite:
v A complete set of protocol layers is referred to as a
protocol suite or a protocol stack, reflecting the
layered structure
v The protocol stack conforms to the seven-layer
Reference Model for Open Systems Interconnection
(OSI) adopted by the International Organization for
Standardization (ISO) [ISO 1992]
v The OSI Reference Model was adopted in order to
encourage the development of protocol standards to
meet the requirements of open systems
Department of Computing and Communication
Technology (CCT) slide 56
Network Principles
Protocols:
v Protocol Suite:

Department of Computing and Communication


Technology (CCT) slide 57
Network Principles
Protocols: Protocol Suite:

Department of Computing and Communication


Technology (CCT) slide 58
Network Principles
Protocols:
v Protocol Suite:
v The implementation of the Internet does not follow the
OSI model (It follows the Internet protocol stack)
v First, the application, presentation and session layers
are not clearly distinguished in the Internet protocol
stack
v Instead, they are implemented either as a single
middleware layer or separately within each
application
v Thus the inter-object invocations and data
representations in a middleware library is included
in each application process
Department of Computing and Communication
Technology (CCT) slide 59
Network Principles
Protocols:
v Protocol Suite:
v The Second, the (Transport) Internetwork protocol suites
include an application layer, a transport layer and an
internetwork layer
v The internetwork layer is a ‘virtual’ network layer that is
responsible for transmitting internetwork packets to a
destination computer
v An internetwork packet is the unit of data transmitted
over an internetwork

Department of Computing and Communication


Technology (CCT) slide 60
Network Principles
Protocols: Protocol Suite:

Internet Protocol Stack

Source https://docs.oracle.com/cd/E19620-01/805-
4041/intro-78284/index.html

Department of Computing and Communication


Technology (CCT) slide 61
Network Principles
Protocols: Protocol Suite:

Source https://www.w3.org/People/Frystyk/thesis/TcpIp.html

Department of Computing and Communication


Technology (CCT) slide 62
Network Principles
Protocols:
Packet Assembly:
v The task of dividing messages into packets before
transmission and reassembling them at the receiving
computer is performed in the transport layer
v The network-layer protocol packets consist of a header and
a data field
v In network technologies, the data field is variable in length,
with the maximum length called the maximum transfer unit
(MTU)
v If the length of a message exceeds the MTU of the
underlying network layer, it must be fragmented into chunks
of the appropriate size, with sequence numbers
Department of Computing and Communication
Technology (CCT) slide 63
Network Principles
Protocols:
Packet Assembly:
v The sequence numbers are used on reassembly process at
the receiving end
v For example, the MTU for Ethernets is 1500 bytes – no
more than that quantity of data can be transmitted in a
single Ethernet packet
Ports:
v The transport layer’s task is to provide a network-
independent message transport service between pairs of
network ports
v Ports are software-defined destination points at a host
computer
Department of Computing and Communication
Technology (CCT) slide 64
Network Principles
Protocols:
Ports:
v Ports are software-based and managed by a computer's
operating system
v Ports allow computers to differentiate between different
kinds of traffic
v They are attached to processes, enabling data transmission
to be addressed to a specific process at a destination node
Addressing:
v The transport layer is responsible for delivering messages to
destinations with transport addresses that are composed of
the network address of a host computer and a port number

Department of Computing and Communication


Technology (CCT) slide 65
Department of Computing and Communication
Technology (CCT) slide 66
Cluster Computing
v Cluster computing refers to the use of multiple
interconnected computers, known as nodes or cluster
nodes, to work together as a single computing system
v It involves the aggregation of computing resources such
as processors, memory, storage, and networking to
provide high-performance computing capabilities
v In a cluster computing setup, the nodes are connected
through a high-speed network that enables them to
communicate and share data efficiently
v The cluster can be composed of a few nodes to hundreds
of nodes, depending requirements of the computing task
Department of Computing and Communication
Technology (CCT) slide 67
Cluster Computing
v The users using nodes have an idea that only a single
system responds to them
v This concept is defined as the transparency of the system
v To work correctly, a cluster needs management nodes
that will:
v Coordinate the load-sharing
v Detect node failure and schedule its replacement

Department of Computing and Communication


Technology (CCT) slide 68
Cluster Computing

A schematic cluster architecture


Source https://www.baeldung.com/cs/computer-clusters-types

Department of Computing and Communication


Technology (CCT) slide 69
Cluster Computing
v Components of Computer Clusters:
v Computing Nodes: servers that process the user
load; they range from simple desktop computers to massive
high-end servers
v Managing Nodes: servers that monitor the cluster hardware
and software, taking measures to reconfigure it according to
any event
v The managing node software can run on computing nodes to
minimize the needed resources
v Private Network(s): This is where the communication
between nodes takes place
v It is responsible for the ‘Are you there?’ messages that the nodes use
to verify what servers are up and need to reconfigure and synchronize
the cluster
Department of Computing and Communication
Technology (CCT) slide 70
Cluster Computing
v Components of Computer Clusters:
v Shared redundant storage: is where the data is available to
all computing nodes
v For a computing node to take over a failed one, it needs to
access the common data
v Public-access layer: This virtualizes access to the cluster so
the cluster will look like a single system
v It can operate by creating virtual IPs that will host the service
entry points
v It will distribute the incoming requisitions to the currently
active hosts

Department of Computing and Communication


Technology (CCT) slide 71
Cluster Computing - Advantages
v Cluster computing offers several advantages over
traditional single-computer systems:
v High Performance: By distributing the workload across
multiple nodes, cluster computing can achieve significantly
higher processing power and computational performance
v It allows tasks to be executed in parallel, reducing the overall
execution time
v Scalability: Clusters can be easily scaled by adding or
removing nodes as needed
v This flexibility makes it possible to accommodate changing
computational requirements without the need to replace the
entire system

Department of Computing and Communication


Technology (CCT) slide 72
Cluster Computing - Advantages
v Advantages of cluster computing over traditional single-
computer systems:
v Fault Tolerance: Cluster computing systems incorporate
redundancy and fault-tolerant mechanisms
v If a node fails, the workload can be automatically shifted to other
available nodes, ensuring the continuity of the computing process
v Resource Sharing: Cluster computing environments enable
resource sharing among multiple users or applications
v Different users or tasks can access and utilize the computing
resources of the cluster based on their needs, leading to efficient
resource utilization
v This flexibility allows organizations to optimize resource allocation and
prioritize critical tasks

Department of Computing and Communication


Technology (CCT) slide 73
Cluster Computing - Disadvantages
v While cluster computing offers several advantages, there
are also some disadvantages associated with it:
v Complexity: Setting up and managing a cluster computing
environment can be complex and requires specialized
knowledge and skills
v Cluster systems often involve multiple interconnected
components, including networking, storage, and software
configurations
v Ensuring proper integration, administration, and
troubleshooting can be challenging

Department of Computing and Communication


Technology (CCT) slide 74
Cluster Computing - Disadvantages
v The disadvantage of cluster computing:
v Maintenance and Management: Cluster systems require
ongoing maintenance and management
v This includes monitoring the health and performance of
individual nodes, managing software updates, configuring
and optimizing the cluster for specific tasks, and
troubleshooting issues that may arise
v The complexity of managing a cluster can result in increased
maintenance and management overhead compared to a
traditional single-computer system

Department of Computing and Communication


Technology (CCT) slide 75
Cluster Computing - Disadvantages
v The disadvantage of cluster computing:
v Cluster Communication Overhead: In cluster computing, tasks
are distributed among multiple nodes, and data needs to be
shared between nodes for processing
v This communication between nodes causes overhead in terms of latency
and network bandwidth
v If the communication overhead becomes significant, it can affect the
overall performance and efficiency of the cluster
v Energy Consumption: Cluster computing systems tend to
consume more energy compared to individual computers due to
the larger number of nodes and supporting infrastructure
v This can result in increased operational costs
v Energy-efficient cluster design and management strategies can help
mitigate this disadvantage
Department of Computing and Communication
Technology (CCT) slide 76
Cluster Computing Types
v There are four different types of Clusters
v Load Balancing Clusters
v High Availability (HA) & Fail-Over Clusters
v HA & Load Balancing Clusters
v Distributed & Parallel Processing Clusters
v Load Balancing Clusters:
v Load Balancing: - Is the process of distributing incoming
network traffic that is directed to the distributed number of
servers
v A load balancer stands as an aggregator of traffic from
clients which sits in front of several servers and routing these
requests to the servers that can serve the requests
Department of Computing and Communication
Technology (CCT) slide 77
Cluster Computing Types
v Load Balancing Clusters:
v If a single server goes down, the load balancer redirects
traffic to the remaining online servers
v When a new server is added to the server group, the load
balancer automatically starts to send requests to it
v The load balancer functions
v Distributes client requests or network load efficiently across
multiple servers
v Ensures high availability and reliability by sending requests
only to servers that are online
v Provides the flexibility to add or subtract servers as demand
dictates
Department of Computing and Communication
Technology (CCT) slide 78
Cluster Computing Types
v Load Balancing Clusters:

Load Balancer Diagram


Source What Is Load Balancing? How Load Balancers Work (nginx.com)

Department of Computing and Communication


Technology (CCT) slide 79
Cluster Computing Types
v Load Balancing Clusters:
v In a load-balancing cluster setting, incoming user requests or
network traffic are distributed across multiple servers or
nodes based on predefined algorithms or policies
v This distribution helps to avoid overloading any single server
and ensures that no individual server becomes a
performance bottleneck
v Components and Characteristics of Load Balancing
Cluster
q Load Balancer:
q The load balancer is the central component of the cluster
responsible for receiving incoming requests and distributing
them among the available servers
Department of Computing and Communication
Technology (CCT) slide 80
Cluster Computing Types
v Load Balancing Clusters:
v Components and Characteristics of Load Balancing
Cluster
q Load Balancer:
q Acts as an entry point for all incoming traffic and applies the
load balancing algorithm to determine the appropriate server
to handle each request
q Servers or Nodes:
q The servers or nodes in the cluster are computers/devices that
are responsible for processing incoming requests
q They are typically identical in terms of hardware and software
configurations to ensure consistency and avoid any single
point of failure
Department of Computing and Communication
Technology (CCT) slide 81
Cluster Computing Types
v Load Balancing Clusters:
v Components and Characteristics of Load Balancing
Cluster
q Load Balancing Algorithms:
q Various load-balancing algorithms are used to determine how
traffic is distributed across the servers
q They are divided into two categories – Static Load Balancing
& Dynamic Load Balancing
q The choice of algorithm depends on factors such as the nature
of the workload, server capacities, and performance
requirements

Department of Computing and Communication


Technology (CCT) slide 82
Cluster Computing Types
v Components and Characteristics of Load Balancing
q Load Balancing Algorithms – Static Load Balancing
Algorithm
q Static load balancing algorithms follow fixed rules and are
independent of the current server state
q They are efficient and simple to implement but they can lead to
uneven distribution of traffic toward the backend servers
q Example of Static Algorithms:
q Round-Robin Load Balancing Algorithm:
q The round-robin algorithm directs the client requests to
different backend servers based on a rotating list
q The load-balancer maintains the list of servers and directs
the incoming requests in a round-robin fashion:
Department of Computing and Communication
Technology (CCT) slide 83
Cluster Computing Types
v Components and Characteristics of Load Balancing
q Load Balancing Algorithms – Static Load Balancing
Algorithm
q Example of Static Algorithms:
q Round-Robin Load Balancing Algorithm:
q The first coming request is directed to the first server, the
second request is directed to the second server, the third
request is directed to the third server, etc,
q When the load balancer algorithm reaches the end of the
list of server, it start over to direct the coming request to
the first server, and the process keeps repeating in that
fashion

Department of Computing and Communication


Technology (CCT) slide 84
Cluster Computing Types
v Components and Characteristics of Load Balancing
q Load Balancing Algorithms – Static Load Balancing
Algorithm
q Round-Robin Load Balancing Algorithm:

Department of Computing and Communication


Technology (CCT) slide 85
Cluster Computing Types
v Components and Characteristics of Load Balancing
q Load Balancing Algorithms – Static Load Balancing
Algorithm
q Weighted Round-Robin Algorithm:
q Is similar to the round-robin load balancing algorithm, but
it adds the ability to spread the incoming client requests
across the servers according to their capacity (Server
Resources, e.g., CPU power, RAM, etc)
q It is most appropriate for spreading incoming client
requests across a set of servers that have varying
capabilities or available resources
q System administrator assigns a weight to each server
based on criteria of their choosing that indicates the
relative traffic-handling capability of each server
Department of Computing and Communication
Technology (CCT) slide 86
Cluster Computing Types
v Components and Characteristics of Load Balancing
q Load Balancing Algorithms – Static Load Balancing
Algorithm
q Weighted Round-Robin Algorithm:
q For example: if application server #1 is twice as powerful
as application server #2 (and application server #3),
application server #1 is provisioned with a higher weight,
and application server #2 and #3 get the same, lower,
weight
q If there are five (5) sequential client requests, the first two
(2) go to application server #1, the third (3) go to
application server #2, the fourth (4) to application server
#3, and the fifth (5) request would then go to application
server #1, and so on
Department of Computing and Communication
Technology (CCT) slide 87
Cluster Computing Types
v Components and Characteristics of Load Balancing
q Load Balancing Algorithms – Dynamic Load Balancing
Algorithm
q Dynamic load balancing algorithms examine the current state
of the servers before distributing traffic
q This configuration requires communication between the load-
balancer and the server before the requests are distributed to
the server
q Each server is configured with an agent that is responsible for
providing status updates to the load balancer
q They are complex to configure compared to static load
balancers but they provide efficient distributions of client
requests

Department of Computing and Communication


Technology (CCT) slide 88
Cluster Computing Types
v Components and Characteristics of Load Balancing
q Load Balancing Algorithms – Dynamic Load Balancing
Algorithm
q Example of Dynamic Algorithms:
q Least Connections:
q Check which servers have the fewest connections open at
the time and send traffic to those servers
q This assumes all connections require roughly equal
processing power
q It aims to balance the load evenly across servers and
prevent overloading
q However, it may not consider server capacity or
performance, leading to potential inefficiencies
Department of Computing and Communication
Technology (CCT) slide 89
Cluster Computing Types
v Components and Characteristics of Load Balancing
q Load Balancing Algorithms – Dynamic Load Balancing
Algorithm
q Example of Dynamic Algorithms:
q Least Response Time:
q The response time is the total time that the server takes to
process the incoming requests and send a response
q This algorithm routes requests to the server with the shortest
response time and active connections
q It provides fast and responsive service by directing requests to
the most efficient server
q However, it requires accurate and up-to-date information
about server response times, which can be challenging to
obtain in real-time
Department of Computing and Communication
Technology (CCT) slide 90
Cluster Computing Types
v Components and Characteristics of Load Balancing
q Health Monitoring:
q Load balancers perform health checks on the servers to
ensure they are capable of handling requests
q If a server becomes unresponsive or fails, the load balancer
can automatically remove it from the rotation until it is
restored or replaced
q Scalability:
q Load-balancing clusters provide scalability by allowing
additional servers to be added to the cluster when the demand
increases
q This helps distribute the load across a larger number of
servers
Department of Computing and Communication
Technology (CCT) slide 91
Cluster Computing Types
v Components and Characteristics of Load Balancing
q Configuration & Management:
q Load balancing clusters require proper configuration and
management to optimize performance and adapt to changing traffic
patterns
q This includes setting up appropriate load-balancing policies,
monitoring server health, adjusting server weights, and ensuring
consistent application deployment across the cluster
q Session Persistence:
q Some applications require maintaining a session state for a particular
user across multiple requests
q Load balancers employ session persistence techniques, such as
source IP affinity or cookie-based session stickiness, to ensure that
subsequent requests from a client are directed to the same server to
maintain session continuity
Department of Computing and Communication
Technology (CCT) slide 92
Cluster Computing Types
v High Availability (HA) and Fail-over cluster
v A high availability (HA) cluster is a group of computers that
work together to provide continuous service, even if one or
more of the computers fail
v HA clusters are used in mission-critical applications where
downtime is unacceptable, such as e-commerce websites,
online banking, and telecommunications
v HA clusters work by using redundancy and failover
mechanisms
v Redundancy means that multiple computers in the cluster
can perform the same tasks
v Failover means that if one computer fails, another computer
in the cluster will automatically take over its tasks
Department of Computing and Communication
Technology (CCT) slide 93
Cluster Computing Types
v High Availability (HA) and Fail-over cluster
v HA architectures use redundant software/hardware
performing a similar function, installed on multiple machines,
so each of them can be used as a backup when another
component fails
v The Heartbeat Technique
q High-availability cluster servers use a replication method and
heartbeat technique
q The purpose of this technique is to monitor cluster node health
via a dedicated network connection
q Each node in the cluster constantly advertises its availability to
the other nodes by sending a “heartbeat” signal over the
dedicated network link (The signals are then received and
processed by the cluster manager)
Department of Computing and Communication
Technology (CCT) slide 94
Cluster Computing Types
v High Availability (HA) clusters technologies of
implementation
v Active-active clusters:
q In a cluster with an active/active design, there are two or more
nodes with the same configuration, each of which is directly
accessed by clients
q If one node fails, clients automatically connect to the other
node and start working with it, as long as it has enough
resources (because one node is now handling the load for two
nodes)
q After restoring or replacing the first node, clients are again split
between the two original nodes

Department of Computing and Communication


Technology (CCT) slide 95
Cluster Computing Types
v High Availability (HA) clusters technologies of
implementation
v Active-active clusters:
q The traffic routing strategy can follow a round-robin algorithm,
in which clients requests are distributed between the available
nodes, or it may follow a weighing scheme, in which one node
takes precedence over another by a certain percentage
v Active-passive clusters:
q In an active-passive cluster, initially, only one computer in the
cluster is active and processing requests
q The other computers are passive and waiting to take over if the
active computer fails

Department of Computing and Communication


Technology (CCT) slide 96
Cluster Computing Types
v High Availability (HA) clusters technologies of
implementation
v Active-passive clusters:
q When the active node fails, both new and existing sessions are
transferred to a backup or inactive node
q Always add one more redundant component for each type of
resource to ensure there are sufficient resources for existing
demand while covering potential failure
v N+1 Clusters
q In an N+1 cluster, there are N computers in the cluster that
are active and processing requests
q There is also one additional computer that is passive and
waiting to take over if any of the active computers fail
Department of Computing and Communication
Technology (CCT) slide 97
Cluster Computing Types
v High Availability (HA) clusters technologies of
implementation
A storage area network (SAN) is a
dedicated high-speed network or
subnetwork that interconnects and
presents shared pools of storage
devices to multiple servers

2-node HA Cluster
Source https://en.wikipedia.org/wiki/High-availability_cluster

Department of Computing and Communication


Technology (CCT) slide 98
Source https://www.snia.org/education/storage_networking_primer/san/what_san
Cluster Computing Types
v Component and features of HA Clusters
q Redundant Hardware:
q HA clusters use redundant hardware components, such as
power supplies, network interfaces, and storage devices
q This redundancy helps eliminate single points of failure and
increases the overall system reliability
q Cluster Management Software:
q HA clusters rely on specialized cluster management software
to monitor the health and status of each node
q This software detects failures and triggers failover
mechanisms to transfer the workload to healthy nodes
q Examples of management software include Red Hat Cluster
Suite, Proxmox, Heartbeat, etc.
Department of Computing and Communication
Technology (CCT) slide 99
Cluster Computing Types
q Cluster Management Software:

Department of Computing and Communication


Technology (CCT) slide 100
Cluster Computing Types
v Component and features of HA Clusters
q Heartbeat Monitoring:
q Nodes in an HA cluster communicate with each other using a heartbeat
mechanism
q Heartbeat messages are exchanged at regular intervals to verify the
availability of each node
q If a node fails to send or respond to heartbeat messages, it is considered
offline, and failover procedures are initiated
q Failover Mechanism:
q When a node fails or becomes unresponsive, the cluster management
software initiates failover procedures
q The workload and resources hosted on the failed node are transferred to
another healthy node in the cluster
q This process involves redirecting network traffic, replicating data, and
ensuring application continuity
Department of Computing and Communication
Technology (CCT) slide 101
Cluster Computing Types
v Component and features of HA Clusters
q Load Balancing:
q High-availability clusters incorporate load-balancing mechanisms to
evenly distribute the workload across multiple nodes
q Load balancing helps optimize resource utilization and prevents any
single node from becoming overwhelmed with excessive traffic
q Data Replication:
q To ensure data availability and integrity, HA clusters employ data
replication techniques
q Data is replicated across multiple nodes or storage devices, providing
redundancy and resilience against data loss

Department of Computing and Communication


Technology (CCT) slide 102
Cluster Computing Types
v Difference between Load Balancing and High
Availability Clusters
v Focus
q Load Balancing Cluster: Focuses on the distribution of
incoming network traffic across multiple servers or nodes in
a balanced manner
q Helps in resource utilization optimization and improving system
performance by evenly distributing the workload
q High Availability Cluster: Focuses on providing redundancy,
fault tolerance, and seamless failover in the event of
hardware or software failure
q This ensures continuous availability and uptime of a system or
service
Department of Computing and Communication
Technology (CCT) slide 103
Cluster Computing Types
v Difference between Load Balancing and High
Availability Clusters
v Failure Handling:
q Load Balancing Cluster: If one server or node fails, the load
balancer redirects incoming traffic to other healthy servers
q However, the failed server itself may cause a disruption for the
existing connections or sessions
q High Availability Cluster: If one server or node fails, the
workload and resources are automatically transferred to
another healthy node without interrupting the service
q The failover process is transparent to the users, and the system
continues to operate seamlessly

Department of Computing and Communication


Technology (CCT) slide 104
Cluster Computing Types
v Difference between Load Balancing and HA Clusters
v Redundancy:
q Load Balancing Cluster: Load balancing clusters focus on
distributing the workload across multiple servers, but they
may not have redundant components or data replication
mechanisms
q Redundancy is not a primary concern
q High Availability Cluster: High availability clusters are
designed with redundancy in mind
q They incorporate redundant hardware components, such as power
supplies, network interfaces, and storage devices
q Data replication and synchronization are commonly used to
ensure redundancy and data availability
Department of Computing and Communication
Technology (CCT) slide 105
Cluster Computing Types
v High Availability (HA) & Load Balancing Clusters
v This cluster model combines both clusters’ features from HA
and Load Balancing
v The combination provides a powerful solution that offers
both fault tolerance and efficient workload distribution
v This type of Clusters is commonly used for email, web, news,
and FTP servers
v This approach allows for continuous availability of services
while optimizing performance and resource utilization

Department of Computing and Communication


Technology (CCT) slide 106
Cluster Computing Types
v High Availability (HA) & Load Balancing Clusters
v In this configuration, multiple nodes are organized into a
high-availability cluster, where each node is capable of taking
over the workload of another node in case of a failure
v Additionally, a load balancer is placed in front of the cluster
to evenly distribute incoming traffic across the available
nodes
v The load balancer monitors the health and status of each
node and directs traffic to healthy nodes

Department of Computing and Communication


Technology (CCT) slide 107
Cluster Computing Types
v Distributed & Parallel Processing Clusters
v Distributed and parallel processing clusters are systems that
consist of multiple computers or nodes connected together to
work on a single task or multiple tasks simultaneously
v These clusters are designed to handle large-scale computations
and data-processing tasks that require significant computational
power and resources
q Distributed processing: Distributed processing involves breaking
down a task or problem into smaller subtasks and distributing
them across multiple computers or processing nodes that are
connected over a network
q Each node operates independently on its assigned portion of
the task, and communication and coordination between nodes
are necessary to complete the overall computation
Department of Computing and Communication
Technology (CCT) slide 108
Cluster Computing Types
v Distributed & Parallel Processing Clusters
q Parallel processing: Parallel processing involves dividing a
computation or task into smaller parts and executing those parts
simultaneously on multiple processors or computing cores within a
single system
q Each processor works on its assigned subset of the task, and
the results are combined to produce the final output
v Distributed and parallel processing clusters are commonly used in
fields such as scientific research, engineering simulations, data
analysis, machine learning, and artificial intelligence
v They enable researchers and professionals to tackle complex
problems and perform computationally intensive tasks that would
be impractical or time-consuming on a single computer

Department of Computing and Communication


Technology (CCT) slide 109
Cluster Computing Types
v Distributed & Parallel Processing Clusters

Source https://blog.purestorage.com/purely-informational/parallel-vs-distributed-computing-an-overview/

Department of Computing and Communication


Technology (CCT) slide 110
Configuring Cluster
v Steps to Configure Cluster Computing

References: https://www.particleincell.com/2020/ubuntu-linux-cluster/
https://www.wikihow.com/Build-a-Supercomputer
https://www.tutorialspoint.com/how-to-install-and-configure-cluster-with-two-
nodes-in-linux
https://www.tecmint.com/setup-high-availability-clustering-in-centos-ubuntu/
https://www.digitalocean.com/community/tutorials/how-to-create-a-
redundant-storage-pool-using-glusterfs-on-ubuntu-20-04
https://upcloud.com/resources/tutorials/haproxy-load-balancer-ubuntu
https://tecadmin.net/how-to-setup-haproxy-load-balancing-on-ubuntu-
linuxmint/
https://deploy.equinix.com/developers/guides/load-balancing-ha/

Department of Computing and Communication


Technology (CCT) slide 111

You might also like